US8905303B1 - Method for adaptive wireless payment - Google Patents
Method for adaptive wireless payment Download PDFInfo
- Publication number
- US8905303B1 US8905303B1 US14/016,133 US201314016133A US8905303B1 US 8905303 B1 US8905303 B1 US 8905303B1 US 201314016133 A US201314016133 A US 201314016133A US 8905303 B1 US8905303 B1 US 8905303B1
- Authority
- US
- United States
- Prior art keywords
- application
- payment
- transaction
- mobile device
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000003044 adaptive effect Effects 0.000 title claims description 26
- 238000004891 communication Methods 0.000 claims description 42
- 238000013475 authorization Methods 0.000 claims description 33
- 238000012790 confirmation Methods 0.000 claims description 16
- 230000010267 cellular communication Effects 0.000 claims description 10
- 230000001133 acceleration Effects 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 claims 2
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 239000000243 solution Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G06Q23/325—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4015—Transaction verification using location information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- G06Q23/223—
Definitions
- the present invention relates to systems and methods for payment, and most particularly, adaptive mobile payment using a smart phone.
- a method for adaptive wireless payment comprising:
- a first application running onboard a first mobile device obtains a first request to authorize a first transaction via short wireless communication, whereby after the first transaction is approved using the first application, the first mobile device sends a peer-to-peer digital currency corresponding to an amount associated with the first transaction via short wireless communication, wherein the first application can mark the peer-to-peer digital currency as consumed or can delete the peer-to-peer digital currency, wherein the approval encompasses authorization, confirmation, acceptance, permission or agreement, wherein the approval can use an approval method selected from the approval method group consisting of: a button is activated or a menu is selected or a display is touched, a pass code is authenticated or biometric information is verified, a motion is sensed or a spoken word is detected, an application is brought to the foreground, and a notification is received wirelessly; whereby after the first application obtains a second request to authorize a second transaction and after the second transaction is approved using the first application, the first mobile device sends payment information to a remote server via cellular communication,
- a method for adaptive wireless payment comprising:
- a first application running onboard a first mobile device obtains a first request to authorize a first transaction, wherein the first request is obtained from a first remote server via cellular communication;
- a first request for approval notification can be sent to a second mobile device
- payment information is selected from the group consisting of:
- peer-to-peer digital currency credit card information, debit card information, a utility account, a telecom account, an online payment account information, a password, and encryption/decryption keys, wherein the approval encompasses authorization, confirmation, acceptance, permission or agreement.
- a method for adaptive wireless payment comprising:
- a first application running onboard a first mobile device obtains a first request to authorize a first transaction, wherein the request is obtained via short wireless communication; whereby after the first transaction is approved using the first application, the first application sends a peer-to-peer digital currency corresponding to the amount of the first transaction to the remote terminal via short wireless communication, wherein the first application marks the peer-to-peer digital currency as consumed or deletes the peer-to-peer digital currency, wherein the approval encompasses authorization, confirmation, acceptance, permission or agreement; whereby after receiving a receipt or a transaction confirmation, the first application can store or can display the receipt or the transaction confirmation.
- FIG. 1 is a schematic illustrating cloud-based adaptive mobile payment.
- FIG. 2 is a schematic illustrating Bluetooth-based adaptive mobile payment.
- FIG. 3 is a flowchart illustrating cloud-based adaptive mobile payment.
- FIG. 4 is a flowchart illustrating an alternative method for cloud-based adaptive mobile payment
- FIG. 5 is a flowchart illustrating an alternative method for cloud-based adaptive mobile payment with manual fulfillment
- FIG. 6 is a flowchart illustrating Bluetooth-based adaptive mobile payment.
- FIG. 7 is a flowchart illustrating adaptive mobile payment.
- This patent teaches a method for facilitating payment using a smart phone.
- This patent teaches using a smart phone application for authentication to any application on any on-line terminal or off-line terminal.
- This patent teaches enabling youth or people without access to payment mediums to perform payment though a sponsor.
- This patent also teaches adaptive user authentication to reduce fraud and enhance the user experience.
- the current invention uses a smart phone application to authenticate the user with multi-factor authentication, and to adapt the authentication to the current location, current transaction, user profile, threat level and policies.
- a young person can request a person to sponsor his/her payments.
- the sponsor is requested to authorize the transaction and to supply a payment method.
- the sponsor authorizes the transaction, the person is notified and can complete the transaction with payment processed by the sponsor.
- Threat level When the threat level is high, users may be required to voice authenticate
- the current invention uses a smart phone application to interface to on-line terminals through cloud, and to interface to off-line terminals through short wireless communication including Bluetooth, RF ID, and NFC . . . .
- On-line terminals can be a web application, mobile application, interactive TV, point of sale application.
- Off-line terminals can be a parking meter . . . .
- the current invention uses a smart phone application to manage any currency or payment medium including Bitcoin, PayPal account, Square account, credit cards, debit cards, . . . .
- the user payment currency and/or payment account information is encrypted and stored on the user's smart phone (in a secure memory location such as keychain or secure element), and is not stored in a centralized database.
- the payment information is provided to authorize merchants, and can only be decrypted using an authorized API (application programming interface).
- the payment information is encrypted with PKI, and only approved merchants can read the payment information using a merchant public key.
- the merchant's key can also be revoked should the merchant loose privileges.
- the user's private key can also be revoked should the user experience a breach, a loss of smart phone or a theft.
- This provides the advantage of no single point-of-failure where a hacker can gain payment accounts for a large number of users. This also provides the advantage of no privacy concerns, and no single entity that knows all your financial information.
- the user can back up his/her information to a backup account on his/her personal computer or on a cloud backup service that is independent of the merchant.
- payment information can be stored on a central merchant portal.
- the system includes an on-line terminal 10 , a mobile authentication device 12 , a second mobile authentication device 13 distinct from mobile authentication device 12 , a communication server 14 and an application/payment server 16 .
- On-line terminal 10 can be any device including a mobile device, a computing device, a television set, a point of sale terminal, a door entry reader.
- On-line terminal 10 communicates with communication server 14 and with application/payment server 16 using wireless/cellular data communication or wired communication.
- On-line terminal 10 runs applications or operations that collaborate with application/payment server 16 to provide merchant services and fulfillment services to the user.
- On-line terminal 10 can request payment from application/payment server 16 . It needs the user credentials and payment details.
- the user credentials and payment details are supplied by mobile authentication device 12 / 13 through communication server 14 .
- on-line terminal 10 holds encrypted user information.
- the encrypted user information can only be decrypted using digitals keys obtained from mobile authentication device 12 / 13 and through communication server 14 . Once decrypted, the user information can be used to execute payment transactions on application/payment server 16 .
- the invention involves a user initiating a transaction from on-line terminal 10 , the user providing authentication from a mobile authentication device 12 / 13 that are physically separate from on-line terminal 10 , and using on-line terminal 10 (and possibly application/payment server 16 ) for fulfillment.
- the sign-up process may include a username/password (possibly for active directory), financial account information and user authentication information such as PIN, password and/or biometrics (voice responses to challenge questions, photos . . . ).
- the sign up process can also require contact information for the user, e.g., mailing address and email.
- the user authentication method is different from a previously used second user authentication method.
- the user or sponsor can give consent to perform a payment transaction with a merchant using the smart phone. If the user is not within a predetermined distance from the merchant, the user may have to go through stricter authentication such as biometrics or two-man-rule.
- the merchant can, without a presentment of the physical payment card, charge (in the case of credit cards) or debit (in the case of debit cards) the user's financial account for items the user wants to buy using a user's payment card or account that is sent encrypted during the transaction and decrypted for the transaction.
- the user does not need to physically present a credit card to the merchant.
- the merchant uses a card that is on file.
- the user can sign up using a mobile application or using an online website, and can use the mobile authentication device 12 / 13 , or another computing device such as on-line terminal 10 , e.g., a home computer.
- a user authentication application program is downloaded to the user mobile authentication device 12 , e.g., through an application store.
- Mobile authentication device 12 is a smart phone that has a unique identifier. It is connected to the network or internet through 3G or Wifi, and is equipped with an accelerometer, a tilt detector and/or Bluetooth.
- the device unique ID is registered with the user's account so as to guarantee that the account it tightly linked to mobile authentication device 12 .
- Data sent to on-line terminal 10 can be encrypted with the device's ID in order to guarantee that only an authorized corresponding device can read data sent from mobile authentication device 12 / 13 .
- Communication server 14 can hold the user accounts. It serves as a communication medium between on-line terminal 10 and mobile authentication device 12 / 13 . Communication server 14 can also hold policies that dictate authentication and authorization rules. In a preferred embodiment, data on communication server 14 is encrypted, and communication server 14 does not store any user login or authentication information beyond the time span of the transaction. Immediately after on-line terminal 10 retrieves the user information, the user login or authentication information is deleted. In this embodiment, the user login and authentication information is encrypted and stored on the user on-line terminal 10 . This ensures that user login and authentication information is never kept in one place, and is distributed over the user terminals.
- the advantages is that 1) there is no central repository for the user access and authentication information for multiple applications 2) Each terminal holds encrypted login and authentication information 3) The authentication information cannot be decrypted without physically having mobile authentication device 12 and authenticating to the authentication application 4) Different login and authentication information for different applications are encrypted with different application digital keys stored on mobile authentication device 12 / 13 .
- Application/payment server 16 authenticates users and provides payment services. A user must have a user account and must the user information must be authenticated in order to receive payment services.
- a normal transaction starts with a user requesting a service using on-line terminal 10 .
- On-line terminal 10 sends a request to communication server 14 .
- the user activates the authentication application on mobile authentication device 12 / 13 , it obtains the request from communication server 14 , authenticates the user using adaptive authentication, and supplies the digital keys for the transaction.
- On-line terminal 10 obtains the digital keys for the transaction, and uses them to request authorization from application/payment server 16 . Once authorized, application/payment server 16 provides services to the user over on-line terminal 10 .
- the user account on communication server 14 is paired with at least one smart phone unique identifier.
- the user cannot log in to the account without a paired smart phone. Pairing is a way of associating or linking a smart phone application to a user account.
- a unique identifier for the smart phone is stored in the user account on communication server 14 .
- the application onboard the smart phone obtains the unique identifier of the smart phone, and uses it to authenticate to the user account on communication server 14 .
- the system includes an off-line terminal 11 , a mobile authentication device 12 , and an application/payment server 16 .
- Off-line terminal 11 can be any device that is no always connected to the network.
- this can be a parking meter, a door, a printer, etc.
- Off-line terminal 11 can communicate to a central server through a low-bandwidth mesh network or a Zigbee network.
- data from off-line terminal 11 is collected using a USB flash drive.
- a flowchart illustrates a method for cloud-based adaptive mobile payment.
- a first transaction is initiated onboard on-line terminal 10 .
- a user requests to purchase some goods from a web browser, or a user requests to purchase something from an application, or a user requests to purchase something on from an interactive TV set, or a user requests to purchase something from a Point of Sale terminal, etc.
- the user can provide a user identifier such as a user name or a phone number.
- the on-line terminal 10 can scan the user's authentication device id 12 / 13 wirelessly using Bluetooth or scan a bar code.
- the user identifier can also be determined automatically through profiling such as a TV set determining who is in the room based on computer vision or other information.
- the user transaction can be determined automatically from the current context. For example, if the user is watching a show, and there is a button or icon to purchase an item, the user can click on that button, and the transaction request will be automatically filled. The user may enter a quantity.
- the button or icon can also be part of an application onboard the merchant terminal 10 .
- on-line terminal 10 posts a request for authentication to communication server 14 corresponding to a user account.
- the request for authentication can have the transaction details.
- On-line terminal 10 can also post the required authentication method for the request based on policies corresponding to the transaction risk, location risk, user risk, device risk, time risk . . . , i.e. simple action verification, pass code verification or biometric verification based on context, transaction authorization by a second person . . . .
- This enables adaptive authentication or stepped up authentication whereby authentication is eased when the user/location/transaction risk is lower, and the authentication is hardened automatically when the user/location/transaction/user risk is higher.
- the request for authentication can comprise first transaction information such as the name of the goods, quantity, price, merchant, photo of the good, or any other information.
- the first application can send a photo of the authorized user to the merchant for authentication.
- the first application can also send shipping information.
- the user is logged in to an authentication application onboard a smart phone mobile authentication device 12 .
- the authentication application authenticates the user using the user account onboard communication server 14 .
- the authentication application requests user authentication on install or the first time is it run, and after that, it will not request the user to user to authenticate.
- the user application requests the user to authenticate every predetermined period of time, where the predetermined period of time is updated using a web-enabled policy dashboard.
- the authentication application can obtain policy information from a database or a policy server or a policy dashboard.
- the policy information indicates threshold, trusted locations, authentication method per location per transaction amount, timeout per location or transaction amount, distance threshold between device and merchant terminal . . . .
- the transaction information may be presented to the user onboard authentication device 12 to make sure that the user confirms the correct transaction.
- On-line terminal 10 can obtain policy information from a remote server policy database.
- the policy information indicates conditions for authorization such as:
- a flowchart illustrates an alternative method for cloud-based adaptive mobile payment.
- a first transaction is initiated onboard on-line terminal 10 .
- Steps 30 to 34 are described in FIG. 3 .
- step 40 after the second person authorizes the transaction by the first person, a notification is sent to the first user to request confirmation from the first user.
- step 41 after the first user confirms the transaction using an application onboard second mobile authentication device 13 , the payment information is posted to communication server 14 .
- step 42 on-line terminal 10 obtains the payment information, decrypts it, and executes the transaction.
- FIG. 5 a flowchart illustrates an alternative method for cloud-based adaptive mobile payment with manual fulfillment.
- Steps 30 to 34 are described in FIG. 3 .
- Steps 40 to 41 are described in FIG. 4 .
- step 50 on-line terminal 10 obtains payment information, decrypts it, and sends it to a person who executes the transaction manually on behalf of the second user.
- the flowchart illustrates a method for Bluetooth-based adaptive mobile payment to an off-line terminal.
- a first transaction is initiated onboard on-line terminal 10 .
- off-line terminal 11 scans for compatible Bluetooth devices in proximity using Bluetooth scan or obtain an identifier from a user or scan a bar code or obtain an identifier from memory/database.
- the off-line terminal can check the found devices against a list of authorized devices or authorization policies, for example, but looking at the device name matches a known list, or the device ID matches a known list or range, or by checking the device has characteristics or properties that correspond to a known list. If more than one device is found to match, the off-line terminal can display a list of found devices.
- the user can select the correct device, and can enter an authorization code corresponding to the selected device The user can enter the code either on the terminal or from the authorization application.
- off-line terminal 11 sends a first request for payment to mobile devices that are found within proximity.
- a user activates an authorization application onboard mobile authorization device 12 .
- the user can select a payment method.
- the first application sends payment information.
- Payment information can be any information that can be used to execute payment. For example, a billing account, a charge account, a credit card, a debit card, etc.
- the first application onboard mobile authorization device 12 sends digital certificates representing currency to off-line terminal 11 .
- peer-to-peer digital currency such as Bitcoin certificates/keys is sent to off-line terminal 11 .
- the digital/Bitcoin certificates/keys are marked as consumed so that they cannot be used for other transactions in step 65 .
- off-line terminal 11 can connect to a second device, and can send the collected digital certificates to the second device.
- off-line terminal 11 connects to a mesh network. Alternatively, a user inserts a USB flash drive to collect digital certificates from off-line terminal 11 .
- the authorization application onboard mobile authorization device 12 communicates with the off-line terminal via short wireless communication. If the terminal connects to the network, the authorization application onboard mobile authorization device 12 communicates with the on-line terminal via a remote server via cellular communication. The authorization application polls the remote server to obtain requests, and updates the requests. The online terminal sends requests to the remote server, and polls the remote server to obtain responses.
- the authorization application can communicate with multiple terminals it can communication a first remote terminal via short wireless communication and with a second remote terminal via a remote server and cellular communication. Payment information is sent to the corresponding terminal. The payment information can be decrypted using the public key associated with the authorization application.
- the public key can be obtained by a merchant through a second system, where the merchant has to authorize to the second system, in order to obtain a public key of a client. This ensures that payment information is encrypted at all times, and that only authorized merchants can access it. After decryption, the payment information is used directly as currency; it can be used to charge an account or to fill a payment form. In case where payment if fulfilled using a sponsor's account or a second authentication application, payment information corresponding to the sponsor's account or to the second authentication information is sent to the merchant. The merchant obtains the public key associated with the sponsor or with the second authentication application and uses it to decrypt the payment information. After successful completion of a payment transaction, the authorization application obtains a receipt or a transaction confirmation number or message.
- Motion information is generally information from an accelerometer, a gyro or a tilt sensor located onboard the mobile device. If the motion information is above a threshold can indicate either a violent snatching or theft action. It can also indicate a relay attack whereby a second user is embracing the personality of the first user to make a transaction, generally after a user walks by a hacking spot. With motion detection, since the user is walking, the user cannot be doing a transaction, and therefore, payment operations should not be authorized.
- the transaction is cancelled.
- the duration threshold is different for trusted locations verses non-trusted locations, and the timeout used for a first transaction in one location is different from the timeout used for a second transaction in a second location.
- the timeout duration threshold per location/transaction, authentication policies per location/transaction, user password needed or not per location/transaction can be determined using a policy dashboard/database.
- the timeout duration threshold per location/transaction, authentication policies per location/transaction, user password needed or not per location/transaction can be determined using a code received from the merchant request for approval.
- the first application can post sensor information to a server and if the sensor information does not match at least one pre-determined policy, the operation is aborted.
- payment information corresponding to the second mobile device is provided after the first transaction is approved using the first authorization application and the first transaction is approved using a second mobile device and the first transaction is confirmed using the first authorization application.
- a first authorization application is linked to a sponsor's account that corresponds to a third application onboard a third mobile device. When a user makes a purchase from a merchant, and the transaction is captured using the merchant terminal, the user approves payment for the transaction using the first authentication application onboard authentication device 12 .
- a notification is sent automatically (and possibly in real-time) to the third mobile device.
- the notification can be an SMS or an in-app notification.
- the notification indicated to the second user that the first user is making a purchase, and is requesting sponsorship for payment.
- the third application can display details of the transaction such as the product name, photo, price, etc.
- This step is important as it ensures that the first user will be ready to collect the goods, and that the merchant knows that the goods are to be delivered to the first user. It is noted that during this operation, the first user never obtains or sees payment information of the second user.
- the payment information can be withheld. If the current location in inside trusted geo-locations, no password or biometric information, or sponsor approval is requested. The user can be requested to touch a screen, a button, bring an application to the foreground, perform a motion, and say a word. Also, if the current location is outside trusted geo-locations, password or biometric information is requested.
- the biometric information can be: voice authentication, voice authentication challenge, handwriting authentication challenge, fingerprint authentication, iris authentication, and facial authentication.
- voice authentication voice authentication challenge
- handwriting authentication challenge fingerprint authentication
- iris authentication iris authentication
- facial authentication if the distance between the current location of the authentication device and the location of the merchant is above a threshold, the payment transaction is not authorized.
- step 70 a first transaction is initiated onboard a terminal.
- step 72 if the terminal finds network connectivity, the on-line terminal posts a request for payment information to a communication server 14 in step 76 . It obtains the payment information through the communication server provided that the user authorizes the transaction using an authentication application onboard mobile authorization device 12 .
- step 74 if the terminal does not find network connectivity, the off-line terminal 11 scans for compatible Bluetooth devices, and requests payment information from them. Once a user authorizes a transaction using an authorization application onboard mobile authorization device 12 , the payment information is transferred through Bluetooth to off-line terminal 11 .
- the off-line or on-line terminals are upgraded using object code injection or application wrapping, whereby the injected object code enables connectivity, data encryption/decryption and secure transfer of data (SSL) with the authentication application.
- object code injection or application wrapping whereby the injected object code enables connectivity, data encryption/decryption and secure transfer of data (SSL) with the authentication application.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
-
- Users cannot make purchases without their wallets
- Drivers often struggle to find quarters to pay for parking meters
- Youth can only make cash payments
- Buyers in overseas countries often have to incur large transaction fees in order to receive a wire transfer from a sponsor and make a local purchase
- Plastic card theft and fraud is a major problem
Current payment technologies are point solutions that cannot scale to multiple mediums: - NFC, QR codes and credit cards work well with point of sale (POS) terminals
- Credit cards work well with POS, web/cloud and over the phone payment
- PayPal works well with web
- Square works well with merchant mobile terminal-as-POS
- None of the current payment technologies works with interactive TV, mobile apps or parking meters.
a button is activated or a menu is selected or a display is touched, a pass code is authenticated or biometric information is verified, a motion is sensed or a spoken word is detected,
an application is brought to the foreground, and a notification is received wirelessly;
whereby after the first application obtains a second request to authorize a second transaction and after the second transaction is approved using the first application, the first mobile device sends payment information to a remote server via cellular communication,
wherein the payment information is selected from the group consisting of:
peer-to-peer digital currency, credit card information, debit card information, a utility account, a telecom account, an online payment account information, a password, and encryption/decryption keys.
wherein the approval encompasses authorization, confirmation, acceptance, permission or agreement; whereby after receiving a receipt or a transaction confirmation, the first application can store or can display the receipt or the transaction confirmation.
The invention involves a user initiating a transaction from on-line terminal 10, the user providing authentication from a mobile authentication device 12/13 that are physically separate from on-line terminal 10, and using on-line terminal 10 (and possibly application/payment server 16) for fulfillment.
The user transaction can be determined automatically from the current context. For example, if the user is watching a show, and there is a button or icon to purchase an item, the user can click on that button, and the transaction request will be automatically filled. The user may enter a quantity.
The button or icon can also be part of an application onboard the merchant terminal 10. When the application detects that the user moved the application can lock access to the button or icon.
In
The request for authentication can comprise first transaction information such as the name of the goods, quantity, price, merchant, photo of the good, or any other information. The first application can send a photo of the authorized user to the merchant for authentication. The first application can also send shipping information.
In
In a preferred embodiment, the authentication application requests user authentication on install or the first time is it run, and after that, it will not request the user to user to authenticate. In another preferred embodiment, the user application requests the user to authenticate every predetermined period of time, where the predetermined period of time is updated using a web-enabled policy dashboard.
The authentication application can obtain policy information from a database or a policy server or a policy dashboard. The policy information indicates threshold, trusted locations, authentication method per location per transaction amount, timeout per location or transaction amount, distance threshold between device and merchant terminal . . . .
The transaction information may be presented to the user onboard authentication device 12 to make sure that the user confirms the correct transaction.
On-line terminal 10 can obtain policy information from a remote server policy database. The policy information indicates conditions for authorization such as:
-
- Trusted locations defined by areas around a GPS coordinate or a WIFI network or an area near a known RF transmitter
- User authentication rules
- Location authorization rules
- Transaction authorization rules
Authentication device 12 obtains sensor information from sensors located onboard the device, such as current location (from a GPS receiver), acceleration (from an accelerometer), gyration, tilt, Wifi networks in view, radio frequency networks in view, radio frequency signal strength, lighting level, audio level, temperature.
The authentication device 12 can post the sensor information tocommunication server 14. If the sensor information does not match the policy parameters, the authentication device 12 can: abort operation, block response, lock, exist, cloak, cancel the current transaction, and encrypt data.
Upon detection of a user event or activation, the authentication application can fetches thecommunication server 14 for pending requests for the user. It can determine the current location of the mobile authentication device 12 and send it tocommunication server 14. If the distance between mobile authentication device 12 and on-line terminal 10 is below a predetermined threshold, then the pending request is processed.
The location of the merchant device is generally static and known. The location of mobile authentication device 12 is determined live using a GPS receiver, WIFI or a location determination system onboard mobile authentication device 12.
If a pending request is found, the authentication application on mobile authentication device 12 displays the transaction details such as merchant name, item name, cost, account, photos etc. The authentication application can send the photo of the authorized user to the merchant for visual authentication. The authentication application can send the shipping information of the user to the merchant.
Authentication device 12 authenticates the user using adaptive authentication:
a button is activated or a menu is selected or a display is touched,
a pass code is authenticated or biometric information is verified,
a motion is sensed or a spoken word is detected,
an application is brought to the foreground,
and a notification is received wirelessly.
It is noted that authorization can mean approval, confirmation, acceptance, permission, agreement or any positive indication,
If the user is authenticated, it sends the user digital keys corresponding to the first transaction tocommunication server 14.
The first mobile device can send a peer-to-peer digital currency corresponding to an amount associated with the transaction via short wireless communication,
and can mark the peer-to-peer digital currency corresponding to an amount associated with the transaction as consumed or can delete the peer-to-peer digital currency corresponding to an amount associated with the transaction.
If the amount of peer-to-peer digital currency corresponding to or contained in the first authentication device 12 is more than an amount of a transaction, the peer-to-peer digital currency corresponding to the amount of the transaction is sent. If the amount of peer-to-peer digital currency is less than the amount of the transaction, a request for approval notification is sent to a second mobile device, and payment if defaulted to the second mobile device. Once the user of the second mobile device approves the transaction, payment information of the second mobile device is used or debited.
The first mobile device can send credit card information, debit card information, a utility account, a telecom account, online payment account information, a password, and encryption/decryption keys.
On-line terminal 10 fetches for the digital keys for the first transaction fromcommunication server 14. On-line terminal 10 uses the digital keys to decrypt the user information (such as username and password . . . ) and uses the decrypted information to login or authenticate to an application on remote application/payment server 16.
Instep 33, if the authentication method requires authorization from a second person, a notification is automatically sent to a second person's mobile device. The notification can be an SMS or an in-app notification. The notification requests the second user to authorize the transaction of the first user.
Instep 34, when the second user activates an application onboard secondmobile authentication device 13, the application displays information about the transaction that the first user started including the transaction details. The second user can accept the transaction. The second user can also assign a payment method for the transaction such as Bitcoin, credit card, PayPal account . . . . In another embodiment, the second application authenticates the second user.
It is noted that during the enrollment/configuration process, the first user can request a second person to be the authorizer for the transactions that the first user performs. After supplying the user name and password of the second user, the account of the first user will be linked to the account of the second user, and transactions of the first user will be automatically sent to the second user for approval and payment fulfillment.
It is noted that during the enrollment process, the first user can make send a request to a second person to sponsor transactions. A message will be sent to the second person, and when confirmed, the account of the first user will be linked to the account of the second user, and transactions of the first user will be automatically sent to the second user for approval and payment fulfillment.
Instep 35, after the second person authorizes the transaction by the first person, a notification is sent to the first user.
Instep 36, on-line terminal 10 obtains payment information of the second person, decrypts it, and executes the transaction.
Instep 37, confirmation/receipt information is sent tomobile authentication device 1 and/or 2.
In another embodiment, if a terminal cannot connect to a network, the authorization application onboard mobile authorization device 12 communicates with the off-line terminal via short wireless communication. If the terminal connects to the network, the authorization application onboard mobile authorization device 12 communicates with the on-line terminal via a remote server via cellular communication. The authorization application polls the remote server to obtain requests, and updates the requests. The online terminal sends requests to the remote server, and polls the remote server to obtain responses.
In another preferred embodiment, the authorization application can communicate with multiple terminals it can communication a first remote terminal via short wireless communication and with a second remote terminal via a remote server and cellular communication. Payment information is sent to the corresponding terminal. The payment information can be decrypted using the public key associated with the authorization application. The public key can be obtained by a merchant through a second system, where the merchant has to authorize to the second system, in order to obtain a public key of a client. This ensures that payment information is encrypted at all times, and that only authorized merchants can access it. After decryption, the payment information is used directly as currency; it can be used to charge an account or to fill a payment form.
In case where payment if fulfilled using a sponsor's account or a second authentication application, payment information corresponding to the sponsor's account or to the second authentication information is sent to the merchant. The merchant obtains the public key associated with the sponsor or with the second authentication application and uses it to decrypt the payment information.
After successful completion of a payment transaction, the authorization application obtains a receipt or a transaction confirmation number or message. It can display the receipt or confirmation information and can store it.
In another embodiment, if motion is sensed or the signal strength of a Bluetooth link falls below a threshold or a Bluetooth link is dropped, payment information is not sent or payment operation is aborted. Motion information is generally information from an accelerometer, a gyro or a tilt sensor located onboard the mobile device. If the motion information is above a threshold can indicate either a violent snatching or theft action. It can also indicate a relay attack whereby a second user is embracing the personality of the first user to make a transaction, generally after a user walks by a hacking spot. With motion detection, since the user is walking, the user cannot be doing a transaction, and therefore, payment operations should not be authorized.
In another embodiment, if the duration from the initiation of the transaction or from the time the transaction was authorized by a second party to the time the transaction is confirmed exceeds a duration threshold, the transaction is cancelled. In another embodiment, the duration threshold is different for trusted locations verses non-trusted locations, and the timeout used for a first transaction in one location is different from the timeout used for a second transaction in a second location.
The timeout duration threshold per location/transaction, authentication policies per location/transaction, user password needed or not per location/transaction can be determined using a policy dashboard/database.
The timeout duration threshold per location/transaction, authentication policies per location/transaction, user password needed or not per location/transaction can be determined using a code received from the merchant request for approval.
The first application can post sensor information to a server and if the sensor information does not match at least one pre-determined policy, the operation is aborted.
In a preferred embodiment, payment information corresponding to the second mobile device is provided after the first transaction is approved using the first authorization application and the first transaction is approved using a second mobile device and the first transaction is confirmed using the first authorization application.
In another preferred embodiment, a first authorization application is linked to a sponsor's account that corresponds to a third application onboard a third mobile device. When a user makes a purchase from a merchant, and the transaction is captured using the merchant terminal, the user approves payment for the transaction using the first authentication application onboard authentication device 12. Once the user approves the transaction using the first authorization application, a notification is sent automatically (and possibly in real-time) to the third mobile device. The notification can be an SMS or an in-app notification. The notification indicated to the second user that the first user is making a purchase, and is requesting sponsorship for payment. The third application can display details of the transaction such as the product name, photo, price, etc.
Once the user of the third mobile device authorizes the transaction, a notification is sent automatically to the first mobile device. The notification indicates that the sponsor has authorized the transaction request, and will pay for it. The user of the first application needs to confirm the transaction before the payment information of the sponsor is transferred to the merchant. This step is important as it ensures that the first user will be ready to collect the goods, and that the merchant knows that the goods are to be delivered to the first user. It is noted that during this operation, the first user never obtains or sees payment information of the second user.
In another embodiment, if the current location of the first mobile device is inside designated geo-locations, the payment information can be withheld. If the current location in inside trusted geo-locations, no password or biometric information, or sponsor approval is requested. The user can be requested to touch a screen, a button, bring an application to the foreground, perform a motion, and say a word. Also, if the current location is outside trusted geo-locations, password or biometric information is requested.
The biometric information can be: voice authentication, voice authentication challenge, handwriting authentication challenge, fingerprint authentication, iris authentication, and facial authentication.
In another embodiment, if the distance between the current location of the authentication device and the location of the merchant is above a threshold, the payment transaction is not authorized.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/016,133 US8905303B1 (en) | 2013-09-01 | 2013-09-01 | Method for adaptive wireless payment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/016,133 US8905303B1 (en) | 2013-09-01 | 2013-09-01 | Method for adaptive wireless payment |
Publications (1)
Publication Number | Publication Date |
---|---|
US8905303B1 true US8905303B1 (en) | 2014-12-09 |
Family
ID=52001570
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/016,133 Expired - Fee Related US8905303B1 (en) | 2013-09-01 | 2013-09-01 | Method for adaptive wireless payment |
Country Status (1)
Country | Link |
---|---|
US (1) | US8905303B1 (en) |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100097179A1 (en) * | 2007-07-09 | 2010-04-22 | Fujitsu Limited | User authentication device and user authentication method |
US20140201057A1 (en) * | 2013-01-11 | 2014-07-17 | Brian Mark Shuster | Medium of exchange based on right to use or access information |
US20150142573A1 (en) * | 2013-01-31 | 2015-05-21 | Hung-Chan Chien | Systems and methods for storing pictures on a cloud platform and printing the pictures from different locations |
US20150209678A1 (en) * | 2014-01-30 | 2015-07-30 | Leetcoin Inc. | Gaming Platform System and Method for Interactive Participation by Players with Successes and Losses Transacted Using Bitcoin |
US20150248661A1 (en) * | 2014-03-03 | 2015-09-03 | Comenity Llc | Credit account linking system |
US20150304323A1 (en) * | 2014-01-31 | 2015-10-22 | Apple Inc. | Use of a Biometric Image for Authorization |
US20160165442A1 (en) * | 2014-12-05 | 2016-06-09 | Xiaomi Inc. | Method for unlocking administration authority and device for authentication |
US20160248752A1 (en) * | 2015-02-24 | 2016-08-25 | Go Daddy Operating Company, LLC | Multi factor user authentication on multiple devices |
WO2016161167A1 (en) * | 2015-03-31 | 2016-10-06 | Visa International Service Association | Peer-to peer mobile device payment network |
US20170061419A1 (en) * | 2015-08-28 | 2017-03-02 | Samsung Electronics Co., Ltd. | Payment information processing method and apparatus of electronic device |
US20170330188A1 (en) * | 2016-05-13 | 2017-11-16 | Samsung Electronics Co., Ltd. | Electronic apparatus providing electronic payment and operating method thereof |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US20180174143A1 (en) * | 2016-12-19 | 2018-06-21 | International Business Machines Corporation | Differential commit time in a blockchain |
US10068213B2 (en) * | 2015-09-09 | 2018-09-04 | Mastercard International Incorporated | Systems and methods for facilitating cross-platform purchase redirection |
US10171449B2 (en) * | 2013-12-18 | 2019-01-01 | Tencent Technology (Shenzhen) Company Limited | Account login method and device |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US10269017B1 (en) * | 2017-11-21 | 2019-04-23 | Capital One Services, Llc | Transaction confirmation and authentication based on device sensor data |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US10331937B2 (en) * | 2017-04-19 | 2019-06-25 | International Business Machines Corporation | Method and system for context-driven fingerprint scanning to track unauthorized usage of mobile devices |
US20190208374A1 (en) * | 2015-09-30 | 2019-07-04 | Paypal, Inc. | Client device access to data based on address configurations |
US20190215663A1 (en) * | 2018-01-11 | 2019-07-11 | Htc Corporation | Portable electronic device, operating method for the same, and non-transitory computer readable recording medium |
EP3394810A4 (en) * | 2015-12-23 | 2019-08-07 | LG Electronics Inc. -1- | Mobile device and operating method thereof |
US20190333079A1 (en) * | 2014-08-07 | 2019-10-31 | Mastercard International Incorporated | Method and system for transfer of consumer data to merchants |
US20200036727A1 (en) * | 2018-07-27 | 2020-01-30 | Mapquest, Inc. | Methods and Systems for Authenticating a Reported Geolocation of a Mobile Device |
US20200034846A1 (en) * | 2018-07-30 | 2020-01-30 | Bank Of America Corporation | Security tool |
US20200193443A1 (en) * | 2018-12-17 | 2020-06-18 | Mastercard International Incorporated | System and methods for dynamically determined contextual, user-defined, and adaptive authentication challenges |
US20200202328A1 (en) * | 2017-12-06 | 2020-06-25 | Alibaba Group Holding Limited | Writing and payment for nfc portable devices |
CN111833043A (en) * | 2015-05-25 | 2020-10-27 | 创新先进技术有限公司 | Information interaction method, equipment and server |
US10963860B2 (en) * | 2016-06-23 | 2021-03-30 | Visa International Service Association | Dynamic transaction records |
CN112581125A (en) * | 2015-12-25 | 2021-03-30 | 中国银联股份有限公司 | Offline payment method and system |
IT201900019241A1 (en) * | 2019-10-18 | 2021-04-18 | Gaetano Rizzi | METHOD AND SYSTEM FOR THE CONTROL OF ELECTRONIC PAYMENTS. |
US20210241265A1 (en) * | 2019-11-13 | 2021-08-05 | Misam Abidi | Systems and Methods for Converting Physical Cash into Digital Money at the Point of Sale |
US11100490B1 (en) * | 2020-09-10 | 2021-08-24 | Square, Inc. | Application integration for contactless payments |
US11151523B2 (en) * | 2015-07-21 | 2021-10-19 | Early Warning Services, Llc | Secure transactions with offline device |
US11151535B1 (en) * | 2016-06-13 | 2021-10-19 | Square, Inc. | Utilizing APIs to facilitate open ticket synchronization |
US11188977B2 (en) | 2017-03-08 | 2021-11-30 | Stichting Ip-Oversight | Method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology |
US20210406887A1 (en) * | 2020-06-24 | 2021-12-30 | Mastercard Asia/Pacific Pte. Ltd. | Method and system for merchant acceptance of cryptocurrency via payment rails |
US11232444B2 (en) * | 2018-02-27 | 2022-01-25 | Coolbitx Ltd. | Digital asset transaction method |
US11257061B2 (en) * | 2017-09-27 | 2022-02-22 | Paypal, Inc. | Performing transactions when device has low battery |
US11301833B1 (en) * | 2011-06-09 | 2022-04-12 | Stripe, Inc. | Method and system for communicating location of a mobile device for hands-free payment |
US20220129688A1 (en) * | 2020-10-22 | 2022-04-28 | Paypal, Inc. | Content extraction based on graph modeling |
US11410160B2 (en) * | 2016-11-04 | 2022-08-09 | Walmart Apollo, Llc | Authenticating online transactions using separate computing device |
US11431793B1 (en) | 2022-02-04 | 2022-08-30 | Bank Of America Corporation | System and method using peer-to-peer connections with ultra-wideband for an interaction |
US11544695B2 (en) | 2020-09-10 | 2023-01-03 | Block, Inc. | Transaction identification by comparison of merchant transaction data and context data |
US11562342B1 (en) * | 2015-10-05 | 2023-01-24 | Jpmorgan Chase Bank, N.A. | Systems and methods for authentication using radio frequency tags |
US20230033432A1 (en) * | 2014-10-28 | 2023-02-02 | Poynt Llc | Payment terminal system and method of use |
US20230118542A1 (en) * | 2018-05-10 | 2023-04-20 | Capital One Services, Llc | AUTOMATED TELLER MACHINES (ATMs) HAVING OFFLINE FUNCTIONALITY |
US11676188B2 (en) | 2013-09-09 | 2023-06-13 | Apple Inc. | Methods of authenticating a user |
EP4202814A1 (en) * | 2021-12-21 | 2023-06-28 | Hee Young Park | Card payment method and system through application linkage |
US11790470B1 (en) | 2018-03-16 | 2023-10-17 | Block, Inc. | Storage service for sensitive customer data |
US12041041B2 (en) * | 2019-08-21 | 2024-07-16 | Truist Bank | Location-based mobile device authentication |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US12131308B2 (en) * | 2015-03-05 | 2024-10-29 | American Express Travel Related Services Company, Inc. | Device account activation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090221266A1 (en) * | 2005-10-13 | 2009-09-03 | Ntt Docomo, Inc. | Mobile terminal, access control management device, and access control management method |
US8045961B2 (en) * | 2009-06-22 | 2011-10-25 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US20130159119A1 (en) * | 2011-11-22 | 2013-06-20 | Square, Inc. | Cardless payment transactions |
US20130166398A1 (en) * | 2011-12-22 | 2013-06-27 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for implementing a context based payment system |
-
2013
- 2013-09-01 US US14/016,133 patent/US8905303B1/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090221266A1 (en) * | 2005-10-13 | 2009-09-03 | Ntt Docomo, Inc. | Mobile terminal, access control management device, and access control management method |
US8045961B2 (en) * | 2009-06-22 | 2011-10-25 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US20130159119A1 (en) * | 2011-11-22 | 2013-06-20 | Square, Inc. | Cardless payment transactions |
US20130166398A1 (en) * | 2011-12-22 | 2013-06-27 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for implementing a context based payment system |
Cited By (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100097179A1 (en) * | 2007-07-09 | 2010-04-22 | Fujitsu Limited | User authentication device and user authentication method |
US9019075B2 (en) * | 2007-07-09 | 2015-04-28 | Fujitsu Limited | User authentication device and user authentication method |
US11301833B1 (en) * | 2011-06-09 | 2022-04-12 | Stripe, Inc. | Method and system for communicating location of a mobile device for hands-free payment |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US20140201057A1 (en) * | 2013-01-11 | 2014-07-17 | Brian Mark Shuster | Medium of exchange based on right to use or access information |
US20150142573A1 (en) * | 2013-01-31 | 2015-05-21 | Hung-Chan Chien | Systems and methods for storing pictures on a cloud platform and printing the pictures from different locations |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US11676188B2 (en) | 2013-09-09 | 2023-06-13 | Apple Inc. | Methods of authenticating a user |
US10171449B2 (en) * | 2013-12-18 | 2019-01-01 | Tencent Technology (Shenzhen) Company Limited | Account login method and device |
US20150209678A1 (en) * | 2014-01-30 | 2015-07-30 | Leetcoin Inc. | Gaming Platform System and Method for Interactive Participation by Players with Successes and Losses Transacted Using Bitcoin |
US10735412B2 (en) | 2014-01-31 | 2020-08-04 | Apple Inc. | Use of a biometric image for authorization |
US20150304323A1 (en) * | 2014-01-31 | 2015-10-22 | Apple Inc. | Use of a Biometric Image for Authorization |
US9256866B2 (en) | 2014-03-03 | 2016-02-09 | Comenity Llc | Drivers license look-up |
US20150248661A1 (en) * | 2014-03-03 | 2015-09-03 | Comenity Llc | Credit account linking system |
US11494790B2 (en) * | 2014-08-07 | 2022-11-08 | Mastercard International Incorporated | Method and system for transfer of consumer data to merchants |
US20190333079A1 (en) * | 2014-08-07 | 2019-10-31 | Mastercard International Incorporated | Method and system for transfer of consumer data to merchants |
US11829980B2 (en) * | 2014-10-28 | 2023-11-28 | Poynt Llc | Payment terminal system and method of use |
US20230033432A1 (en) * | 2014-10-28 | 2023-02-02 | Poynt Llc | Payment terminal system and method of use |
US9992676B2 (en) * | 2014-12-05 | 2018-06-05 | Xiaomi Inc. | Method for unlocking administration authority and device for authentication |
US20160165442A1 (en) * | 2014-12-05 | 2016-06-09 | Xiaomi Inc. | Method for unlocking administration authority and device for authentication |
US9686272B2 (en) * | 2015-02-24 | 2017-06-20 | Go Daddy Operating Company, LLC | Multi factor user authentication on multiple devices |
US20160248752A1 (en) * | 2015-02-24 | 2016-08-25 | Go Daddy Operating Company, LLC | Multi factor user authentication on multiple devices |
US12131308B2 (en) * | 2015-03-05 | 2024-10-29 | American Express Travel Related Services Company, Inc. | Device account activation |
US11030605B2 (en) * | 2015-03-31 | 2021-06-08 | Visa International Service Association | Peer-to-peer mobile device payment network |
US20180060855A1 (en) * | 2015-03-31 | 2018-03-01 | Visa International Service Association | Peer-to-peer mobile device payment network |
WO2016161167A1 (en) * | 2015-03-31 | 2016-10-06 | Visa International Service Association | Peer-to peer mobile device payment network |
CN111833043B (en) * | 2015-05-25 | 2024-04-19 | 创新先进技术有限公司 | Information interaction method, equipment and server |
US11250404B2 (en) * | 2015-05-25 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Transaction scheme for offline payment |
CN111833043A (en) * | 2015-05-25 | 2020-10-27 | 创新先进技术有限公司 | Information interaction method, equipment and server |
US11151523B2 (en) * | 2015-07-21 | 2021-10-19 | Early Warning Services, Llc | Secure transactions with offline device |
US20170061419A1 (en) * | 2015-08-28 | 2017-03-02 | Samsung Electronics Co., Ltd. | Payment information processing method and apparatus of electronic device |
US10068213B2 (en) * | 2015-09-09 | 2018-09-04 | Mastercard International Incorporated | Systems and methods for facilitating cross-platform purchase redirection |
US10659932B2 (en) * | 2015-09-30 | 2020-05-19 | Paypal, Inc. | Client device access to data based on address configurations |
US20190208374A1 (en) * | 2015-09-30 | 2019-07-04 | Paypal, Inc. | Client device access to data based on address configurations |
US10979869B2 (en) | 2015-09-30 | 2021-04-13 | Paypal, Inc. | Client device access to data based on address configurations |
US11562342B1 (en) * | 2015-10-05 | 2023-01-24 | Jpmorgan Chase Bank, N.A. | Systems and methods for authentication using radio frequency tags |
EP3394810A4 (en) * | 2015-12-23 | 2019-08-07 | LG Electronics Inc. -1- | Mobile device and operating method thereof |
CN112581125A (en) * | 2015-12-25 | 2021-03-30 | 中国银联股份有限公司 | Offline payment method and system |
US20170330188A1 (en) * | 2016-05-13 | 2017-11-16 | Samsung Electronics Co., Ltd. | Electronic apparatus providing electronic payment and operating method thereof |
US11151535B1 (en) * | 2016-06-13 | 2021-10-19 | Square, Inc. | Utilizing APIs to facilitate open ticket synchronization |
US10963860B2 (en) * | 2016-06-23 | 2021-03-30 | Visa International Service Association | Dynamic transaction records |
US11410160B2 (en) * | 2016-11-04 | 2022-08-09 | Walmart Apollo, Llc | Authenticating online transactions using separate computing device |
US20180174143A1 (en) * | 2016-12-19 | 2018-06-21 | International Business Machines Corporation | Differential commit time in a blockchain |
US11188977B2 (en) | 2017-03-08 | 2021-11-30 | Stichting Ip-Oversight | Method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology |
US10331937B2 (en) * | 2017-04-19 | 2019-06-25 | International Business Machines Corporation | Method and system for context-driven fingerprint scanning to track unauthorized usage of mobile devices |
US11257061B2 (en) * | 2017-09-27 | 2022-02-22 | Paypal, Inc. | Performing transactions when device has low battery |
US11188915B2 (en) * | 2017-11-21 | 2021-11-30 | Capital One Services, Llc | Transaction confirmation and authentication based on device sensor data |
US11783335B2 (en) | 2017-11-21 | 2023-10-10 | Capital One Services, Llc | Transaction confirmation and authentication based on device sensor data |
US10269017B1 (en) * | 2017-11-21 | 2019-04-23 | Capital One Services, Llc | Transaction confirmation and authentication based on device sensor data |
US20200202328A1 (en) * | 2017-12-06 | 2020-06-25 | Alibaba Group Holding Limited | Writing and payment for nfc portable devices |
US11089446B2 (en) * | 2018-01-11 | 2021-08-10 | Htc Corporation | Portable electronic device, operating method for the same, and non-transitory computer readable recording medium |
US20190215663A1 (en) * | 2018-01-11 | 2019-07-11 | Htc Corporation | Portable electronic device, operating method for the same, and non-transitory computer readable recording medium |
US11232444B2 (en) * | 2018-02-27 | 2022-01-25 | Coolbitx Ltd. | Digital asset transaction method |
US11790470B1 (en) | 2018-03-16 | 2023-10-17 | Block, Inc. | Storage service for sensitive customer data |
US20230118542A1 (en) * | 2018-05-10 | 2023-04-20 | Capital One Services, Llc | AUTOMATED TELLER MACHINES (ATMs) HAVING OFFLINE FUNCTIONALITY |
US11178156B2 (en) * | 2018-07-27 | 2021-11-16 | Verizon Patent And Licensing Inc. | Methods and systems for authenticating a reported geolocation of a mobile device |
US11777950B2 (en) | 2018-07-27 | 2023-10-03 | Verizon Patent And Licensing Inc. | Methods and systems for authenticating a reported geolocation of a mobile device |
US20200036727A1 (en) * | 2018-07-27 | 2020-01-30 | Mapquest, Inc. | Methods and Systems for Authenticating a Reported Geolocation of a Mobile Device |
US11037155B2 (en) * | 2018-07-30 | 2021-06-15 | Bank Of America Corporation | Security tool |
US20200034846A1 (en) * | 2018-07-30 | 2020-01-30 | Bank Of America Corporation | Security tool |
US20200193443A1 (en) * | 2018-12-17 | 2020-06-18 | Mastercard International Incorporated | System and methods for dynamically determined contextual, user-defined, and adaptive authentication challenges |
US11880842B2 (en) * | 2018-12-17 | 2024-01-23 | Mastercard International Incorporated | United states system and methods for dynamically determined contextual, user-defined, and adaptive authentication |
US12041041B2 (en) * | 2019-08-21 | 2024-07-16 | Truist Bank | Location-based mobile device authentication |
IT201900019241A1 (en) * | 2019-10-18 | 2021-04-18 | Gaetano Rizzi | METHOD AND SYSTEM FOR THE CONTROL OF ELECTRONIC PAYMENTS. |
EP3809351A1 (en) * | 2019-10-18 | 2021-04-21 | Gaetano Rizzi | Electronic payment control method and system |
US11854002B2 (en) * | 2019-11-13 | 2023-12-26 | Misam Abidi | Systems and methods for converting physical cash into digital money at the point of sale |
US20210241265A1 (en) * | 2019-11-13 | 2021-08-05 | Misam Abidi | Systems and Methods for Converting Physical Cash into Digital Money at the Point of Sale |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US20210406887A1 (en) * | 2020-06-24 | 2021-12-30 | Mastercard Asia/Pacific Pte. Ltd. | Method and system for merchant acceptance of cryptocurrency via payment rails |
US11100490B1 (en) * | 2020-09-10 | 2021-08-24 | Square, Inc. | Application integration for contactless payments |
US11544695B2 (en) | 2020-09-10 | 2023-01-03 | Block, Inc. | Transaction identification by comparison of merchant transaction data and context data |
US11687911B2 (en) | 2020-09-10 | 2023-06-27 | Block, Inc. | Application integration for contactless payments |
US20220129688A1 (en) * | 2020-10-22 | 2022-04-28 | Paypal, Inc. | Content extraction based on graph modeling |
US11657629B2 (en) * | 2020-10-22 | 2023-05-23 | Paypal, Inc. | Content extraction based on graph modeling |
EP4202814A1 (en) * | 2021-12-21 | 2023-06-28 | Hee Young Park | Card payment method and system through application linkage |
US11431793B1 (en) | 2022-02-04 | 2022-08-30 | Bank Of America Corporation | System and method using peer-to-peer connections with ultra-wideband for an interaction |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8905303B1 (en) | Method for adaptive wireless payment | |
US8769643B1 (en) | Method for identifying a remote device | |
US10826702B2 (en) | Secure authentication of user and mobile device | |
US11694188B1 (en) | Systems and methods for contactless card activation | |
US10375082B2 (en) | Method and apparatus for geographic location based electronic security management | |
US11176547B2 (en) | Transaction cryptogram | |
CN107690788B (en) | Identification and/or authentication system and method | |
US9256869B2 (en) | Authentication and verification services for third party vendors using mobile devices | |
US10949859B2 (en) | Enhancing information security via the use of a dummy credit card number | |
EP3207515B1 (en) | Securely authenticating a person depending on context | |
KR101797887B1 (en) | Method, user terminal, and service terminal for processing service data | |
US20170148009A1 (en) | Dynamic multilayer security for internet mobile-related transactions | |
US20200394620A1 (en) | System and method for cryptocurrency point of sale | |
US20170032370A1 (en) | Electronic payment transactions using machine readable code without requiring online connection | |
US20200364694A1 (en) | Contactless mobile payment system | |
CA3044705A1 (en) | System, process and device for e-commerce transactions | |
US20140149294A1 (en) | Method and system for providing secure end-to-end authentication and authorization of electronic transactions | |
US8768306B1 (en) | Method for adaptive mobile identity | |
EP3491776B1 (en) | Multi-device authentication process and system utilizing cryptographic techniques | |
KR20140125449A (en) | Transaction processing system and method | |
JP2015513337A (en) | Hub and spoke PIN confirmation | |
JP2017507562A (en) | Identification and / or authentication systems and methods | |
KR20140023052A (en) | Agent system and method for payment | |
US20230052901A1 (en) | Method and system for point of sale payment using a mobile device | |
US20140372303A1 (en) | Online Authentication and Payment Service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RED DRAGON INNOVATIONS, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AYED, MOURAD BEN;REEL/FRAME:044989/0702 Effective date: 20180205 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.) |
|
AS | Assignment |
Owner name: AYED, MOURAD BEN, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RED DRAGON INNOVATIONS, LLC;REEL/FRAME:046844/0928 Effective date: 20180820 |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20181209 |
|
AS | Assignment |
Owner name: RED DRAGON INNOVATIONS, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AYED, MOURAD BEN;REEL/FRAME:049229/0889 Effective date: 20180205 |
|
AS | Assignment |
Owner name: OPTIMA DIRECT, LLC, WYOMING Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RED DRAGON INNOVATIONS, LLC;REEL/FRAME:049245/0828 Effective date: 20190521 |